Zeus

Zeus hit five major banks in JapanZeus hit five major banks in Japan

Zeus hit five major banks in Japan

Zeus malware is considered the most popular and prolific malicious code for banking, it is one of the privilege agent…

12 years ago
Threat Report H2 2012 proposed by F-SecureThreat Report H2 2012 proposed by F-Secure

Threat Report H2 2012 proposed by F-Secure

Today the principal channel for malware diffusion is considered internet, large diffusion of exploit kits and crimeware such as BlackHole,…

12 years ago
Group-IB: Banking trojan «Carberp» sales were reborn with bootkit moduleGroup-IB: Banking trojan «Carberp» sales were reborn with bootkit module

Group-IB: Banking trojan «Carberp» sales were reborn with bootkit module

During the last week introduced you the excellent work done by the Group-IB, a security firm resident of the Moscow-based Skolkovo…

12 years ago
Skynet, the potential use of Tor as a bulletproof botnetSkynet, the potential use of Tor as a bulletproof botnet

Skynet, the potential use of Tor as a bulletproof botnet

On September 2012 the German security firm G Data Software detected a botnet with a particular feature, it is controlled from an Internet…

12 years ago
How were stolen 36M euro with Eurograbber malwareHow were stolen 36M euro with Eurograbber malware

How were stolen 36M euro with Eurograbber malware

Zeus, a name that security experts know very well, it's one of the most prolific and dangerous malware of the history.…

12 years ago
F-Secure Mobile threat report Q3/2012, cyber threats in the etherF-Secure Mobile threat report Q3/2012, cyber threats in the ether

F-Secure Mobile threat report Q3/2012, cyber threats in the ether

F-Secure  security firm has recently published the “Mobile threat report Q3/2012” related the past quarter that presents the mobile threat…

13 years ago
Russian Underground is just part of a global criminal networkRussian Underground is just part of a global criminal network

Russian Underground is just part of a global criminal network

Trend Micro published a very interesting report on the Russian underground market, the document written by Max Goncharov analyzed the…

13 years ago
What is the Dorkbot worm that is attacking Skype’s users?What is the Dorkbot worm that is attacking Skype’s users?

What is the Dorkbot worm that is attacking Skype’s users?

What could happen if a malware compromises a communication system adopted daily by 663 million users (info dated September 2011)?…

13 years ago
Hackers planning massive attacks against U.S. banks, is it possible?Hackers planning massive attacks against U.S. banks, is it possible?

Hackers planning massive attacks against U.S. banks, is it possible?

In the last weeks we have assisted to a massive DDoS attacks against U.S. financial institutions that demonstrated how much…

13 years ago
To be or not to be… This is AuthenticationTo be or not to be… This is Authentication

To be or not to be… This is Authentication

Article published on The Malta Indipendent Ron Kelson, Pierluigi Paganini, Fabian Martin, David Pace, Benjamin Gittins We use the Internet on…

13 years ago